Analysis
-
max time kernel
146s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 18:17
Static task
static1
Behavioral task
behavioral1
Sample
lpk.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
lpk.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
小零CF刷枪软件.exe
Resource
win7-20221111-en
Behavioral task
behavioral4
Sample
小零CF刷枪软件.exe
Resource
win10v2004-20221111-en
General
-
Target
lpk.dll
-
Size
46KB
-
MD5
149695dd08b7389308b0d0bfb40f47b7
-
SHA1
22082f21d78e21b24623ecb06d13fd15fa53ca3b
-
SHA256
a1eb4f7ab9832baf68862cdfa2ae4c2571880af513d9e942f70c781e22cf4ba9
-
SHA512
f65fe00bb21b80da14a5544970cbb2493b92747aefbd1f33355f3154092fe931b663440bd65d2bec7645f54ee3556825239a4f3bc9ec434c02d728f836f07e18
-
SSDEEP
768:hojY9PKi9eebwtwGYNrihCp2+UGj0W3eE1Y2ahjKQyzkojY9Po:0mJeebwtwLp27GjV3P1Yd2QyzVmg
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 3516 hrl6F59.tmp 3612 kyrvan.exe -
Loads dropped DLL 1 IoCs
pid Process 3612 kyrvan.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\kyrvan.exe hrl6F59.tmp File opened for modification C:\Windows\SysWOW64\kyrvan.exe hrl6F59.tmp File created C:\Windows\SysWOW64\hra33.dll kyrvan.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 3516 hrl6F59.tmp 3516 hrl6F59.tmp 3612 kyrvan.exe 3612 kyrvan.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1088 wrote to memory of 1884 1088 rundll32.exe 79 PID 1088 wrote to memory of 1884 1088 rundll32.exe 79 PID 1088 wrote to memory of 1884 1088 rundll32.exe 79 PID 1884 wrote to memory of 3516 1884 rundll32.exe 80 PID 1884 wrote to memory of 3516 1884 rundll32.exe 80 PID 1884 wrote to memory of 3516 1884 rundll32.exe 80
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\lpk.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1088 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\lpk.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:1884 -
C:\Users\Admin\AppData\Local\Temp\hrl6F59.tmpC:\Users\Admin\AppData\Local\Temp\hrl6F59.tmp3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:3516
-
-
-
C:\Windows\SysWOW64\kyrvan.exeC:\Windows\SysWOW64\kyrvan.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:3612
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
38KB
MD551bca8b89d54e7b9f8ccd310425a50b2
SHA1ce5d59db5d626b4757703c4cf05522dc213d99ec
SHA256d00ed6db20a01540b63f1889abf9c4371d1a87154a686c32b0a9efdc016f44c9
SHA5126f93c45acabe545571d671536aa5d917cfdd790ec8fc817cbd670b72edade654f5b9532b08fa433b27c783aafbc3f76c938f54f13407491ec2ab09da7b440e2e
-
Filesize
38KB
MD551bca8b89d54e7b9f8ccd310425a50b2
SHA1ce5d59db5d626b4757703c4cf05522dc213d99ec
SHA256d00ed6db20a01540b63f1889abf9c4371d1a87154a686c32b0a9efdc016f44c9
SHA5126f93c45acabe545571d671536aa5d917cfdd790ec8fc817cbd670b72edade654f5b9532b08fa433b27c783aafbc3f76c938f54f13407491ec2ab09da7b440e2e
-
Filesize
46KB
MD5149695dd08b7389308b0d0bfb40f47b7
SHA122082f21d78e21b24623ecb06d13fd15fa53ca3b
SHA256a1eb4f7ab9832baf68862cdfa2ae4c2571880af513d9e942f70c781e22cf4ba9
SHA512f65fe00bb21b80da14a5544970cbb2493b92747aefbd1f33355f3154092fe931b663440bd65d2bec7645f54ee3556825239a4f3bc9ec434c02d728f836f07e18
-
Filesize
38KB
MD551bca8b89d54e7b9f8ccd310425a50b2
SHA1ce5d59db5d626b4757703c4cf05522dc213d99ec
SHA256d00ed6db20a01540b63f1889abf9c4371d1a87154a686c32b0a9efdc016f44c9
SHA5126f93c45acabe545571d671536aa5d917cfdd790ec8fc817cbd670b72edade654f5b9532b08fa433b27c783aafbc3f76c938f54f13407491ec2ab09da7b440e2e
-
Filesize
38KB
MD551bca8b89d54e7b9f8ccd310425a50b2
SHA1ce5d59db5d626b4757703c4cf05522dc213d99ec
SHA256d00ed6db20a01540b63f1889abf9c4371d1a87154a686c32b0a9efdc016f44c9
SHA5126f93c45acabe545571d671536aa5d917cfdd790ec8fc817cbd670b72edade654f5b9532b08fa433b27c783aafbc3f76c938f54f13407491ec2ab09da7b440e2e